CN107707530A - A kind of method for secret protection and system of mobile intelligent perception - Google Patents
A kind of method for secret protection and system of mobile intelligent perception Download PDFInfo
- Publication number
- CN107707530A CN107707530A CN201710814904.1A CN201710814904A CN107707530A CN 107707530 A CN107707530 A CN 107707530A CN 201710814904 A CN201710814904 A CN 201710814904A CN 107707530 A CN107707530 A CN 107707530A
- Authority
- CN
- China
- Prior art keywords
- perception
- data
- module
- modulator
- perception data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0613—Third-party assisted
- G06Q30/0615—Anonymizing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
The present invention relates to a kind of method for secret protection and system of mobile intelligent perception; this method includes perception data upload, perception data polymerization and perception data transactional stage; the system includes mixed excitation sensing module, perception data adds module of making an uproar, user key generation module, perception data encrypting module, encryption data uploading module, perception data aggregation module, perception data deciphering module, multi-party computations module and perception data transaction auction module, the present invention establish effective mechanism and perceive the participation of user and the authenticity of perception data to improve;And perception individual subscriber private data can be effectively protected to exempt from leakage; the problems such as false data of preventing malice user, it is relatively low that it is related to algorithm computing cost, has reached safe and efficient design object; use, can be applied in actual production life process suitable for large-scale promotion.
Description
Technical field
The present invention relates to community to perceive field, more particularly to a kind of method for secret protection and system of mobile intelligent perception.
Background technology
The thought of mass-rent is combined by mobile gunz sensory perceptual system with mobile awareness, by the mobile device of domestic consumer its
Embedded type sensor contained by body(Such as acceleration sensor, digital compass, GPS, microphone, shooting it is first-class)As powerful sense
Know unit, conscious or unconscious cooperation is carried out by mobile Internet, forms intelligent perception network, realizes perception task point
Hair is collected with perception data, completes large-scale, complicated social perception task.It perceives mould as a kind of brand-new Internet of Things
Formula provides a kind of new way and means to realize that ubiquitous depth society perceives, but is limited to perceive participant's lazy weight
Not high with the offer quality of data, the development of intelligent perception receives serious influence.
During data perception, perceiving user needs to consume such as device battery electricity, computing resource and data traffic
Resource.There is no appropriate return, participant is not interested to be participated in perceiving.What is more important in mobile gunz sensing network,
The perception data of collection contains a large amount of personal sensitive and privacy informations, faces great private data leakage risk.In addition, modulation
Therefore device can cause intermediary to be obtained with perceiving user with many malice transaction issues be present in service provider's process of exchange
Prospective earnings, or even interests loss.
In order to solve to move the privacy leakage in intelligent perception, most of secret protection schemes are complete to assume intermediary
It is credible, perceive user and secret protection measure is taken in perception task, each user is provided truly in certain perception task
Perception data, one data level of anonymity of simultaneous selection.Data anonymous is available True Data is added noise,k-anonymity
Etc. mode.But the intelligent perception under the incomplete trustworthy information of intermediary is not accounted for, and perceives secret protection used by user
Security threat be present in method(Such as k anonymities can not resist background knowledge attack), also lack malicious user is acted in collusion it is hidden
Private Protective strategy.
In order to solve to move the transaction of the malice in intelligent perception, being introduced into repeated game in game theory prevents the hair of prisoner
It is raw, but still suffer from the problems such as more service provider's competitions are with service provider's secret protection.
In summary, for privacy leakage and malice transaction issues present in mobile intelligent perception, existing solution party
Case from considering simply solve a certain problem in a certain respect, seriously ignores other challenges, it is impossible to comprehensive to solve mobile gunz sense
Perception data secret protection and perception data transaction issues in knowing.Therefore, it is necessary to which above-mentioned peace can be solved simultaneously by inventing one kind
The method and corresponding system of full problem.
The content of the invention
In view of this, it is an object of the invention to provide a kind of method for secret protection and system of mobile intelligent perception, energy
Enough effectively protections perceive individual subscriber private data.
To achieve the above object, the present invention adopts the following technical scheme that:
A kind of method for secret protection of mobile intelligent perception, including:
Perception data is uploaded, perception data polymerization and perception data are merchandised;
The perception data, which uploads, to be comprised the following steps:
Step S11:Perceive user and perception task is participated in by the embedded type sensor of mobile device, obtain perception data;
Step S12:It is distributed plus is made an uproar using distributed geometry and perception data is carried out to add processing of making an uproar;
Step S13:According to key constraint condition, mobile gunz sensory perceptual system generation perceives the encryption key and modulator of user
Decruption key;
Step S14:Encryption key is sent to the perception user for participating in perception task by safe lane, decruption key is passed through
Safe lane is sent to modulator;
Step S15:Perceive user obtain encryption key, pair plus make an uproar processing after perception data be encrypted, obtain ciphertext
And ciphertext is uploaded to modulator;
The perception data polymerization comprises the following steps:
Step S21:Modulator obtains whole ciphertexts that the perception user of all participation perception tasks is uploaded;
Step S22:The progress quadrature computing of gained whole ciphertext is obtained the perception user institute of all participation perception tasks by modulator
Upload the product of ciphertext;
Step S23:Processing is decrypted to the obtained products of step S22 with decruption key and obtains the polymerization of perception data for modulator
As a result and it is stored in modulator;
The perception data transaction comprises the following steps:
Step S31:Type by the polymerization result of the perception data obtained by step S23 is published to mobile gunz sense by modulator
Know all service providers in system;
Step S32:Service provider decides whether to participate in this data trade mistake according to the type of the polymerization result of perception data
Journey, if service provider determines to participate in data trade, carry out step S33;Otherwise, transaction is exited;
Step S33:Modulator record participates in service provider's number of current data transaction auctionnAnd clap participating in data trade
The service provider sold from 1 tonIt is numbered;
Step S34:Modulator produces a random number X by random sequence generator, and provides to the pre- of current transaction data
If price P;
Step S35:Modulator sums random number X and default price P, and result X+P is transferred into numbering by safe lane
For 1 service provider;
Step S36:The service provider that numbering is 1 sums obtained result X+P and oneself quotation P1 to transaction data, and
Result X+P+P1 is sent to the service provider that numbering is 2, the like, until numbering isnService provider will be final
As a result Y is back to modulator, Y=X+P+P1+...+Pn, and Pn is that numbering isnQuotation of the service provider to transaction data;
Step S37:Modulator calculates price p=(the Y-X)/n that starts auction, and the price that will start auction is published to and participates in current data transaction bat
The service provider sold;
Step S38:Service provider each offers according to the price adjustment that starts auction and is sent to modulator;
Step S39:Modulator selects the winning bidder that soprano auctions for data trade that offers in the quotation of service provider;
Step S40:The winning bidder of data trade auction pays the corresponding amount of money according to the quotation of oneself to modulator;
Step S41:Modulator sends the polymerization result of perception data to the winning bidder of data trade auction, completes transaction.
Further, the distribution of distributed geometry plus make an uproar in the step S12 and meet difference privacy, be a kind of drawing of discrete type
Pula this noise addition mechanism, can reduce influences because noise adds on the error caused by the polymerization result of perception data.
Further, encryption uses homomorphic cryptography mode in the step S15.
Further, decryption processes are in the step S23:Ciphertext tire out and multiplies calculating, is not required to each close
Text is decrypted, that is, obtains all plaintext sums.
A kind of intimacy protection system of mobile intelligent perception, including mixed excitation sensing module, perception data add module of making an uproar,
User key generation module, perception data encrypting module, encryption data uploading module, perception data aggregation module, perception data
Deciphering module, multi-party computations module and perception data transaction auction module;
The mixed excitation sensing module, for encouraging more perception users persistently to participate in perception task and providing perception data;
The perception data adds module of making an uproar, for adding noise to perception data using the distribution of distributed geometry;
The user key generation module, user encryption key and modulator decryption are perceived for being generated according to key constraint condition
Key;
The perception data encrypting module, for perception data being encrypted operation;Using perception user encryption key to sense
Primary data is encrypted to obtain ciphertext;
The encryption data uploading module, the ciphertext for perception data encrypting module to be obtained are uploaded to modulator;
The perception data aggregation module, ciphertext obtained by encryption data uploading module is polymerize for modulator;
The perception data deciphering module, for polymerization result obtained by perception data aggregation module to be decrypted;
The multi-party computations module, the service provider for participating in data auction do not reveal in guarantee itself quotation privacy
On the premise of, joint consultation goes out transaction data and started auction price;
The perception data transaction auction module, for selecting winning bidder according to the quotation of service provider, carries out data trade.
Further, in the user key generation module, perceive user encryption key and modulator decruption key by with
Pair machine key schedule randomly generates on the premise of its key constraint condition is met, and completes a perception task, i.e.,
The perception data at certain moment fails after operation is encrypted and decrypted.
The present invention has the advantages that compared with prior art:The present invention is effectively prevented from perceiving individual subscriber privacy
Leaking data, the problems such as the false data of preventing malice user.It is relatively low that it is related to algorithm computing cost, has reached safe and efficient
Design object, use, can be applied in actual production life process suitable for large-scale promotion.
Brief description of the drawings
Fig. 1 is the mobile gunz sensing network schematic diagram of the present invention;
Fig. 2 is a kind of step flow chart of the method for secret protection of mobile intelligent perception of the present invention.
Embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention will be further described.
Distributed geometry distribution is introduced in mobile gunz sensing network by the present invention plus perception of the mechanism to perception user of making an uproar
Data add noise, and difference is perceived user and the perception data for adding noise is encrypted using homomorphic cryptography and uploads to modulation
Device, modulator, which need not decrypt each ciphertext, can draw perception data polymerization result;By by auction mechanism and Secure meter
The data trade mode being combined, effectively solve the pernicious transaction issues between service provider and modulator.
It is as shown in Figure 1 mobile gunz sensing network schematic diagram, including:
100th, user is perceived;110th, modulator;120th, service provider;130th, opponent;
User 100 is perceived, is to use mobile awareness equipment(Such as, intelligent terminal, wearable device, mobile unit etc.)Society
Meeting domestic consumer, upload perception data and simultaneously maximize the corresponding income of acquisition, it is necessary to protect a large amount of sensitivities contained in perception data
And privacy information.
Modulator 110, it is main to be responsible for interacting with perceiving user and service provider.
Service provider 120, mainly buy perception data polymerization result by modulator, for machine learning, data can
Depending on the field such as changing, service is provided for the user of different demands, the service provider of rationality is wished with reasonable prices from modulator
The data of better quality are obtained, to reduce purchase cost, service providers may be selected types of alliance and together buy data progress
It is shared, while share price paid.
The opponent 130, represent to that may be launched a offensive in modulator, perception data upload procedure.
Fig. 2 is refer to, the present embodiment provides a kind of method for secret protection of mobile intelligent perception, including perception data uploads
Stage, perception data polymerization stage and perception data transactional stage;
The perception data upload stage comprises the following steps:
(1)Mixed excitation perceives step
S11, the perception user pass through the embedded type sensor contained by the mobile device of its own(Such as acceleration sensor, number
Word compass, GPS, microphone, shooting are first-class)Perception task is participated in, obtains corresponding perception data;
(2)Perception data adds step of making an uproar
S12, it is distributed using distributed geometry plus makes an uproar that the perception data for perceiving to obtain by step S11 add and made an uproar processing;In
In the present embodiment, distributed geometry distribution plus one kind for being to meet difference privacy of making an uproar add the mode of making an uproar in the step S12, distributed
It is a kind of Laplacian noise addition mechanism for being considered as discrete type that geometry, which is distributed plus made an uproar, can be at utmost using this mechanism
Reduction because noise add and on caused by final perception data polymerization result error influence;
(3)User key generation step
S13, according to system key constraints, mobile gunz sensory perceptual system performs random key generating algorithm and obtains each participation
The perception user encryption key and modulator decruption key of perception.
S14, the encryption key obtained by step S13 is sent to each perception use for participating in perception task by safe lane
Family, the decruption key obtained by step S13 is sent to modulator by safe lane;Safe lane can be public network, specially
With network, cable network, wireless network, but it is safe and reliable, such as SSL, IPSec VPN to require;
(4)Perception data encrypting step
S15, the encryption key for perceiving user's obtaining step S14, pair plus processing of making an uproar after perception data be encrypted to obtain
Ciphertext is simultaneously uploaded to modulator by ciphertext;In the present embodiment, in the step S15 encryption use homomorphic cryptography side
Formula, it is the cryptological technique of the computational complexity theory based on difficult math question, the data Jing Guo homomorphic cryptography handle
To one output, this output is decrypted, its result with Same Way processing unencryption initial data obtain it is defeated
It is the same to go out result.
Perception data polymerization stage comprises the following steps:
(5)Perception data polymerization procedure
S21, modulator obtain whole ciphertexts that the perception user of all participation perception tasks is uploaded by step S15;
The perception user that S22, modulator obtain the progress quadrature computing of gained whole ciphertext all participation perception tasks is uploaded
The product of ciphertext;
(6)Perception data decryption step
S23, modulator upload close with decruption key to the perception user as all participation perception tasks obtained by step S22
The product of text is decrypted processing and obtains the polymerization result of perception data and be stored in modulator;In the present embodiment, the ciphertext
Decryption processes be, by the ciphertext carry out it is tired multiply calculating after, can be not required to that each ciphertext is decrypted, that is, obtain institute
There is plaintext sum.
Perception data transactional stage comprises the following steps:
(7)Multi-party computations step
Type by the perception data polymerization result obtained by step S23 is published to mobile gunz sensory perceptual system by S31, modulator
In all service providers;
S32, service provider decide whether to participate in this data trade process according to the type of perception data polymerization result, if clothes
Business provider determines participation data trade, then participates in the data trade auction process of next step;Otherwise, transaction is exited;
S33, modulator record participate in service provider's number of current data transaction auctionnAnd to participating in data trade auction
Service provider from 1 tonIt is numbered;
S34, modulator will produce a random number by random sequence generator, and provide the default valency to current transaction data
Lattice;
S35, modulator sum random number and default price, and result is transferred into the service that numbering is 1 by safe lane
Provider;
The service provider couple that result of the service provider that S36, numbering are 1 obtained by by step S35 is 1 plus numbering
The quotation of transaction data, and the service provider that numbering is 2 is sent result to, said process is repeated, until numbering isnClothes
Business provider be by numberingn-1Service provider transmitted by result on plus numbering benService provider to transaction
The quotation of data, and final result is back to modulator;
S37, modulator subtract final result the random number in step S34, and by acquired results divided by participate in current data friendship
The service provider's number easily auctioned obtains auction and started auction price;Auction price of starting auction is published to participation current data by modulator
Merchandise the service providers auctioned;In the present embodiment, the process that negotiation data auctions price of starting auction is a kind of typical peace
The complete multi-party collaboration for calculating, solving the respective quotation privacy of protection between the service provider of one group of mutual mistrust in this step
Computational problem, ensure the independence of input, the correctness of calculating, while do not reveal each input value to other clothes for participating in calculating
Be engaged in provider.
(8)Perception data transaction auction step
S38, the service provider for participating in data trade auction adjust according to the price of starting auction of announcement and each offer and be sent to tune
Device processed;
S39, modulator select the winning bidder that soprano auctions for data trade that offers in the quotation of each service provider;
S40, the winning bidder of data trade auction pay the corresponding amount of money according to oneself offering to modulator;
S41, modulator send the perception data polymerization result obtained by step S23 to data trade auction winning bidder, complete
Transaction.
The system that the present embodiment also provides the data-privacy protection in a kind of mobile intelligent perception:Perceived including mixed excitation
Module, perception data add module of making an uproar, user key generation module, perception data encrypting module, encryption data uploading module, perception
Data aggregate module, perception data deciphering module, multi-party computations module and perception data transaction auction module;
Mixed excitation sensing module, for encouraging more perception users to participate in perception task for a long time and providing the perception of better quality
Data;In the present embodiment, mixed excitation mechanism combines 3 kinds of energisation modes in the mixed excitation sensing module:Remuneration branch
The mode of paying, the excitation of reputation integration and service quality excitation;
Perception data adds module of making an uproar, for adding noise to the perception data using the distribution of distributed geometry;Utilize distribution
Geometry distribution can be reduced farthest because of noise addition and to the error shadow caused by final perception data polymerization result
Ring.
User key generation module, user encryption key and modulator decryption are perceived for being generated according to key constraint condition
Key;
Perception data encrypting module, for operation to be encrypted to the perception data;Using the encryption key to the sense
Primary data is encrypted to obtain the ciphertext;
Encryption data uploading module, the ciphertext for perception data encrypting module to be obtained are uploaded to modulator;
Perception data aggregation module, ciphertext obtained by encryption data uploading module is polymerize for modulator;
Perception data deciphering module, for polymerization result obtained by perception data aggregation module to be decrypted;
Multi-party computations module, for participating in the service provider of data auction before ensureing that itself quotation privacy is not revealed
Put, joint consultation goes out transaction data and started auction price;
Perception data transaction auction module, for selecting winning bidder according to the quotation of service provider, carries out data trade.
The foregoing is only presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with
Modification, it should all belong to the covering scope of the present invention.
Claims (6)
- A kind of 1. method for secret protection of mobile intelligent perception, it is characterised in that including:Perception data is uploaded, perception data polymerization and perception data are merchandised;The perception data, which uploads, to be comprised the following steps:Step S11:Perceive user and perception task is participated in by the embedded type sensor of mobile device, obtain perception data;Step S12:It is distributed plus is made an uproar using distributed geometry and perception data is carried out to add processing of making an uproar;Step S13:According to key constraint condition, mobile gunz sensory perceptual system generation perceives the encryption key and modulator of user Decruption key;Step S14:Encryption key is sent to the perception user for participating in perception task by safe lane, decruption key is passed through Safe lane is sent to modulator;Step S15:Perceive user obtain encryption key, pair plus make an uproar processing after perception data be encrypted, obtain ciphertext And ciphertext is uploaded to modulator;The perception data polymerization comprises the following steps:Step S21:Modulator obtains whole ciphertexts that the perception user of all participation perception tasks is uploaded;Step S22:The progress quadrature computing of gained whole ciphertext is obtained the perception user institute of all participation perception tasks by modulator Upload the product of ciphertext;Step S23:Processing is decrypted to the obtained products of step S22 with decruption key and obtains the polymerization of perception data for modulator As a result and it is stored in modulator;The perception data transaction comprises the following steps:Step S31:Type by the polymerization result of the perception data obtained by step S23 is published to mobile gunz sense by modulator Know all service providers in system;Step S32:Service provider decides whether to participate in this data trade mistake according to the type of the polymerization result of perception data Journey, if service provider determines to participate in data trade, carry out step S33;Otherwise, transaction is exited;Step S33:Modulator record participates in service provider's number of current data transaction auctionnAnd clap participating in data trade The service provider sold from 1 tonIt is numbered;Step S34:Modulator produces a random number X by random sequence generator, and provides to the pre- of current transaction data If price P;Step S35:Modulator sums random number X and default price P, and result X+P is transferred into numbering by safe lane For 1 service provider;Step S36:The service provider that numbering is 1 sums obtained result X+P and oneself quotation P1 to transaction data, and Result X+P+P1 is sent to the service provider that numbering is 2, the like, until numbering isnService provider will be final As a result Y is back to modulator, Y=X+P+P1+...+Pn, and Pn is that numbering isnQuotation of the service provider to transaction data;Step S37:Modulator calculates price p=(the Y-X)/n that starts auction, and the price that will start auction is published to and participates in current data transaction bat The service provider sold;Step S38:Service provider each offers according to the price adjustment that starts auction and is sent to modulator;Step S39:Modulator selects the winning bidder that soprano auctions for data trade that offers in the quotation of service provider;Step S40:The winning bidder of data trade auction pays the corresponding amount of money according to the quotation of oneself to modulator;Step S41:Modulator sends the polymerization result of perception data to the winning bidder of data trade auction, completes transaction.
- A kind of 2. method for secret protection of mobile intelligent perception according to claim 1, it is characterised in that:The step Distributed geometry distribution, which adds to make an uproar, in S12 meets difference privacy, is a kind of Laplacian noise addition mechanism of discrete type, can reduce The error caused by the polymerization result of perception data is influenceed because noise adds.
- A kind of 3. method for secret protection of mobile intelligent perception according to claim 1, it is characterised in that:The step Encryption uses homomorphic cryptography mode in S15.
- A kind of 4. method for secret protection of mobile intelligent perception according to claim 1, it is characterised in that:The step Decryption processes are in S23:Ciphertext tire out and multiplies calculating, is not required to that each ciphertext is decrypted, that is, obtains all plaintexts Sum.
- 5. a kind of intimacy protection system of mobile intelligent perception, it is characterised in that including mixed excitation sensing module, perception data Add module of making an uproar, user key generation module, perception data encrypting module, encryption data uploading module, perception data aggregation module, Perception data deciphering module, multi-party computations module and perception data transaction auction module;The mixed excitation sensing module, for encouraging perception user persistently to participate in perception task and providing perception data;The perception data adds module of making an uproar, for adding noise to perception data using the distribution of distributed geometry;The user key generation module, user encryption key and modulator decryption are perceived for being generated according to key constraint condition Key;The perception data encrypting module, for perception data being encrypted operation;Using perception user encryption key to sense Primary data is encrypted to obtain ciphertext;The encryption data uploading module, the ciphertext for perception data encrypting module to be obtained are uploaded to modulator;The perception data aggregation module, ciphertext obtained by encryption data uploading module is polymerize for modulator;The perception data deciphering module, for polymerization result obtained by perception data aggregation module to be decrypted;The multi-party computations module, the service provider for participating in data auction do not reveal in guarantee itself quotation privacy On the premise of, joint consultation goes out transaction data and started auction price;The perception data transaction auction module, for selecting winning bidder according to the quotation of service provider, carries out data trade.
- A kind of 6. intimacy protection system of mobile intelligent perception according to claim 5, it is characterised in that:The user is close In key generation module, perceive user encryption key and modulator decruption key is meeting its key about by random key generating algorithm Randomly generated on the premise of beam condition, and complete a perception task, i.e., reconciliation is encrypted to the perception data at certain moment Failed after close operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710814904.1A CN107707530B (en) | 2017-09-12 | 2017-09-12 | Privacy protection method and system for mobile crowd sensing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710814904.1A CN107707530B (en) | 2017-09-12 | 2017-09-12 | Privacy protection method and system for mobile crowd sensing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107707530A true CN107707530A (en) | 2018-02-16 |
CN107707530B CN107707530B (en) | 2020-07-31 |
Family
ID=61172539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710814904.1A Active CN107707530B (en) | 2017-09-12 | 2017-09-12 | Privacy protection method and system for mobile crowd sensing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107707530B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108494760A (en) * | 2018-03-14 | 2018-09-04 | 安徽大学 | A kind of intelligent perception true value discovery method of protection privacy |
CN108600271A (en) * | 2018-05-10 | 2018-09-28 | 重庆邮电大学 | A kind of method for secret protection of trust state assessment |
CN108769023A (en) * | 2018-05-30 | 2018-11-06 | 苏州大学 | A kind of method for secret protection and system applied to intelligent perception |
CN109214205A (en) * | 2018-08-01 | 2019-01-15 | 安徽师范大学 | Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity |
CN109446844A (en) * | 2018-11-15 | 2019-03-08 | 北京信息科技大学 | A kind of method for secret protection and system towards big data publication |
CN109548014A (en) * | 2018-12-17 | 2019-03-29 | 杭州职业技术学院 | A kind of low energy consumption secret protection polymerization based on mobile polymerization person |
CN109862114A (en) * | 2019-03-12 | 2019-06-07 | 南京邮电大学 | A kind of safety vehicle intelligent perception method calculated based on mist |
CN110087237A (en) * | 2019-04-30 | 2019-08-02 | 苏州大学 | Method for secret protection, device and associated component based on disturbance of data |
CN110135847A (en) * | 2019-05-22 | 2019-08-16 | 同济大学 | The system and method for being used to improve electronic auction safety based on block chain |
CN110166243A (en) * | 2019-05-22 | 2019-08-23 | 安徽师范大学 | Aggregated data method for secret protection based on elliptic curve in a kind of intelligent perception |
CN110570284A (en) * | 2019-09-11 | 2019-12-13 | 安徽大学 | Heterogeneous virtual machine distribution method with differential privacy protection |
CN110752924A (en) * | 2019-10-30 | 2020-02-04 | 四川长虹电器股份有限公司 | Key safety management method based on safety multi-party calculation |
CN110825810A (en) * | 2019-10-28 | 2020-02-21 | 天津理工大学 | Block chain-based crowd sensing double privacy protection method |
CN112423027A (en) * | 2020-10-22 | 2021-02-26 | 武汉理工大学 | Mobile streaming media edge collaboration distribution device and method based on differential privacy |
CN113553614A (en) * | 2021-06-29 | 2021-10-26 | 福建师范大学 | Privacy protection mobile crowd-sourcing perception method based on reinforcement learning |
CN115292743A (en) * | 2022-07-06 | 2022-11-04 | 南京邮电大学 | Big data application system based on intelligent group sensing technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082983A1 (en) * | 2008-09-30 | 2010-04-01 | Shah Rahul C | Secure device association |
US20120316956A1 (en) * | 2011-06-07 | 2012-12-13 | Microsoft Corporation | Client-Server Joint Personalization for Private Mobile Advertising |
CN103763100A (en) * | 2013-10-29 | 2014-04-30 | 清华大学 | Sum and product computing method for protecting data privacy security of arbitrary user group |
CN104657133A (en) * | 2015-01-28 | 2015-05-27 | 南京邮电大学 | Single time window task excitation method for mobile crowd-sourcing perception |
CN104850935A (en) * | 2015-04-15 | 2015-08-19 | 南京邮电大学 | Mobile group intelligent perception excitation method with minimized payment as object |
CN106850106A (en) * | 2017-01-09 | 2017-06-13 | 重庆邮电大学 | Radio environment map datum collection system and method based on mobile intelligent perception |
-
2017
- 2017-09-12 CN CN201710814904.1A patent/CN107707530B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082983A1 (en) * | 2008-09-30 | 2010-04-01 | Shah Rahul C | Secure device association |
US20120316956A1 (en) * | 2011-06-07 | 2012-12-13 | Microsoft Corporation | Client-Server Joint Personalization for Private Mobile Advertising |
CN103763100A (en) * | 2013-10-29 | 2014-04-30 | 清华大学 | Sum and product computing method for protecting data privacy security of arbitrary user group |
CN104657133A (en) * | 2015-01-28 | 2015-05-27 | 南京邮电大学 | Single time window task excitation method for mobile crowd-sourcing perception |
CN104850935A (en) * | 2015-04-15 | 2015-08-19 | 南京邮电大学 | Mobile group intelligent perception excitation method with minimized payment as object |
CN106850106A (en) * | 2017-01-09 | 2017-06-13 | 重庆邮电大学 | Radio environment map datum collection system and method based on mobile intelligent perception |
Non-Patent Citations (1)
Title |
---|
吴垚: ""群智感知激励机制研究综述"", 《软件学报》 * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108494760A (en) * | 2018-03-14 | 2018-09-04 | 安徽大学 | A kind of intelligent perception true value discovery method of protection privacy |
CN108600271B (en) * | 2018-05-10 | 2020-05-22 | 重庆邮电大学 | Privacy protection method for trust state evaluation |
CN108600271A (en) * | 2018-05-10 | 2018-09-28 | 重庆邮电大学 | A kind of method for secret protection of trust state assessment |
CN108769023A (en) * | 2018-05-30 | 2018-11-06 | 苏州大学 | A kind of method for secret protection and system applied to intelligent perception |
CN108769023B (en) * | 2018-05-30 | 2021-04-23 | 苏州大学 | Privacy protection method and system applied to crowd sensing |
CN109214205A (en) * | 2018-08-01 | 2019-01-15 | 安徽师范大学 | Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity |
CN109446844A (en) * | 2018-11-15 | 2019-03-08 | 北京信息科技大学 | A kind of method for secret protection and system towards big data publication |
CN109446844B (en) * | 2018-11-15 | 2020-06-05 | 北京信息科技大学 | Privacy protection method and system for big data release |
CN109548014A (en) * | 2018-12-17 | 2019-03-29 | 杭州职业技术学院 | A kind of low energy consumption secret protection polymerization based on mobile polymerization person |
CN109862114B (en) * | 2019-03-12 | 2021-08-10 | 南京邮电大学 | Safe vehicle crowd-sourcing sensing method based on fog calculation |
CN109862114A (en) * | 2019-03-12 | 2019-06-07 | 南京邮电大学 | A kind of safety vehicle intelligent perception method calculated based on mist |
CN110087237A (en) * | 2019-04-30 | 2019-08-02 | 苏州大学 | Method for secret protection, device and associated component based on disturbance of data |
CN110166243A (en) * | 2019-05-22 | 2019-08-23 | 安徽师范大学 | Aggregated data method for secret protection based on elliptic curve in a kind of intelligent perception |
CN110135847A (en) * | 2019-05-22 | 2019-08-16 | 同济大学 | The system and method for being used to improve electronic auction safety based on block chain |
CN110166243B (en) * | 2019-05-22 | 2022-04-19 | 安徽师范大学 | Aggregation data privacy protection method based on elliptic curve in crowd sensing |
CN110570284A (en) * | 2019-09-11 | 2019-12-13 | 安徽大学 | Heterogeneous virtual machine distribution method with differential privacy protection |
CN110570284B (en) * | 2019-09-11 | 2021-06-08 | 安徽大学 | Heterogeneous virtual machine distribution method with differential privacy protection |
CN110825810A (en) * | 2019-10-28 | 2020-02-21 | 天津理工大学 | Block chain-based crowd sensing double privacy protection method |
CN110825810B (en) * | 2019-10-28 | 2023-05-19 | 天津理工大学 | Block chain-based crowd sensing dual privacy protection method |
CN110752924A (en) * | 2019-10-30 | 2020-02-04 | 四川长虹电器股份有限公司 | Key safety management method based on safety multi-party calculation |
CN112423027A (en) * | 2020-10-22 | 2021-02-26 | 武汉理工大学 | Mobile streaming media edge collaboration distribution device and method based on differential privacy |
CN112423027B (en) * | 2020-10-22 | 2021-10-22 | 武汉理工大学 | Mobile streaming media edge collaboration distribution device and method based on differential privacy |
CN113553614A (en) * | 2021-06-29 | 2021-10-26 | 福建师范大学 | Privacy protection mobile crowd-sourcing perception method based on reinforcement learning |
CN113553614B (en) * | 2021-06-29 | 2023-07-14 | 福建师范大学 | Privacy protection mobile crowd intelligent sensing method based on reinforcement learning |
CN115292743A (en) * | 2022-07-06 | 2022-11-04 | 南京邮电大学 | Big data application system based on intelligent group sensing technology |
Also Published As
Publication number | Publication date |
---|---|
CN107707530B (en) | 2020-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107707530A (en) | A kind of method for secret protection and system of mobile intelligent perception | |
CN112906030B (en) | Data sharing method and system based on multi-party homomorphic encryption | |
CN111095332A (en) | Method and system for privacy-preserving social media advertising | |
CN110087237B (en) | Privacy protection method and device based on data disturbance and related components | |
CN103457727B (en) | A kind of methods, devices and systems for realizing media data processing | |
CN105307165B (en) | Communication means, server-side and client based on mobile application | |
CN109495465A (en) | Privacy set intersection method based on intelligent contract | |
CN113127916A (en) | Data set processing method, data processing device and storage medium | |
CN102025507B (en) | Digital copyright management method for protecting digital content consumer privacy | |
CN110730064B (en) | Data fusion method based on privacy protection in crowd sensing network | |
CN109345331A (en) | A kind of intelligent perception system task distribution method with secret protection | |
CN106789985A (en) | Client validation method and system based on GPU algorithms | |
CN101908961B (en) | Multi-party secret handshaking method in short key environment | |
CN112597542B (en) | Aggregation method and device of target asset data, storage medium and electronic device | |
CN107483505A (en) | The method and system that a kind of privacy of user in Video chat is protected | |
CN115037477A (en) | Block chain-based federated learning privacy protection method | |
Khan et al. | Blockchain-based distributive auction for relay-assisted secure communications | |
CN112581127A (en) | Commodity transaction method and device, computer equipment, storage medium and system | |
CN114491578A (en) | Security data aggregation method for privacy calculation | |
CN113657978A (en) | Distributed energy auction method and system based on block chain and privacy protection | |
Cao et al. | Strong anonymous mobile payment against curious third-party provider | |
Hong et al. | An efficient and secure attribute-based online/offline signature scheme for mobile crowdsensing | |
Zhang et al. | Designing secure and dependable mobile sensing mechanisms with revenue guarantees | |
Wang et al. | A privacy protection scheme for electricity transactions in the microgrid day-ahead market based on consortium blockchain | |
CN108599923A (en) | The implementation method of data efficient safe transmission between cloud computing server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |